The tensions between the desire of government authorities to use every tool available to them to detect and prevent crime — and acts of terrorism, on the one hand, and technologies which offer privacy to businesses and individuals, on the other hand, is not new; the skirmishes between BlackBerry — and, soon, Google and Skype — and the governments of India, Saudi Arabia, and UAE are but the latest round in this decades-old conflict

The RI Department of Corrections has spent thousands of dollars to acquire and train special European police dogs that can scour prison cells, hallways and cafeterias for marijuana, cocaine, heroin and —- cell phones

Michigan will deploy EINSTEIN 1, the DHS-run cyber security system which all federal agencies are required to use; EINSTEIN 1 automates the collection and analysis of computer network security information from participating agency and government networks to help analysts identify and combat malicious cyber-activity

A DHS representative visited New Zealand to explore research collaboration with New Zealand institution; of special interest to DHS is work done at the Human Interface Technology (HIT) Lab at Canterbury University about finding new ways of interacting with large amounts of data, particularly unstructured data — enabling zettabytes (10 to the power 21 bytes) of data to be economically represented in ways that make patterns such as clusters of similarity and outliers readily appreciable by the human eye.